Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <?xml version="1.0"?>
2 <window xmlns:html="http://www.w3.org/1999/xhtml" class="reftest-wait" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" title="Testcase bug 311661 - Evil xul testcase, using display:table-row causes crash [@ nsTableRowGroupFrame::GetFirstRow]">
3 <html:script><![CDATA[
4 function doe() {
5 document.documentElement.getElementsByTagName('*')[1].style.display='table-row';
6 setTimeout(doe2,20);
7 }
8 function doe2(){
9 document.documentElement.getElementsByTagName('*')[1].style.display='';
10 setTimeout(doe,20);
11 }
12 ]]></html:script>
13 <button id="button" onclick="doe()" label="Mozilla should not crash, when clicking this button"/>
14 <div style="display:table-row"/>
15 <html:script>
16 function clickbutton()
17 {
18 var ev = document.createEvent('MouseEvents');
19 ev.initMouseEvent("click", true, true, window, 0, 0, 0, 0, 0, false, false, false, false, 0, null);
20 var button = document.getElementById('button');
21 button.dispatchEvent(ev);
23 setTimeout(function() { document.documentElement.className = "" }, 500);
24 }
25 window.addEventListener("load", clickbutton, false);
26 </html:script>
28 </window>